Wireless Information Systems
I believe that Wireless Information Systems are becoming increasingly essential and accepted by users in the world we’re in today. Most devices and gadgets now come with wireless capabilities that users not only find convenient but are also robust. The ability to browse the internet from any location, receive and send emails from Personal Digital Assistants (PDAs), mobile phones and Laptops is one that is enjoyed and appreciated across numerous countries in the world today. People need to communicate for different reasons; this could be personal or official.
Whatever the mode of communication is, it needs to be convenient and available. Wireless systems serve this purpose. Wireless systems are easy to acquire and configure; this is one of the major reasons why they are accepted and utilized by users every day. In order to appreciate the full benefits that can be gained by deploying wireless systems, there’s a need to delve into its definition, vulnerabilities and why a wireless system is generally accepted by users across the world. What are Wireless Information Systems? A Wireless Information System refers to any hardware or software that does not rely on wires to be functional.
With wireless systems, data is received and transmitted using the air as the primary medium (Proxim, 1998). Wireless information systems can be deployed in areas such as small offices, campus sites and numerous geographical locations. Wireless connections are achieved through the use of electromagnetic waves for communication and these connections do not require any physical medium to transmit signals. Uses of Wireless Information Systems Wireless Information Systems can be used by everyone in any field of endeavour.
Organizations and individuals that strive to remain relevant are always in constant need of communications and technological infrastructure that can facilitate relations, information exchange and access to relevant data at the right time. Wireless systems can be seen in devices such as home automation systems, motion sensors, local area networks, laptops, mobile phones, personal digital assistants, military machines and so on. The applications of wireless systems are diverse and the possibilities that may be achieved with them are endless. Changes in the Usability of Wireless Technology
Wireless Information systems have become increasingly beneficial due to their numerous advantages over wired LAN/Ethernet connections. One major reason is the mobility a wireless system offers. Users can move from one part of an office to another without having to worry about cables and whether network ports will be available and functional at the new location. Its configuration can also be easily modified to fit the ever-changing requirements of the user (Dekleva, Shim, Varshney, & Knoerzer, 2007). The installation of Wireless systems is also cost-effective.
Initially, the cost of setting up the wireless connection may be high but the costs of running cables across an entire building and paying for the associated labour and on-going maintenance is eliminated. The innovations that have been introduced to the market over time have increased its cost-effectiveness (Proxim, 1998). Other major benefits are the flexible modes of installation, the scalability and the ease at which these wireless systems can be deployed. Unresolved Deployment Issues A major vulnerability associated with wireless systems is security.
Because wireless systems have to transmit data over air, it is possible that some or all of the signals sent may be intercepted intentionally or otherwise. Certain security protocols have however been introduced to ensure that messages can be encrypted at lower levels; higher levels may remain unprotected and vulnerable to attacks. This encryption is not a hundred percent fool-proof and can still be exploited in many ways by potential hackers. Examples of havocs that can be caused in wireless information systems include spoofing, spamming, Distributed Denial-of-Service attacks (DDoS) and so on (Proxim, 1998).
A form of DDoS attack can occur when a user blocks the channel for transmission by injecting junk into that channel. If a person’s laptop is stolen, attackers can gain access to the network and wreck havoc on the wireless information system (Komu &Nordstrom, 1999). Another major setback with wireless systems is their accessibility. Since they announce their existence anytime a computer is switched on, malicious people can immediately identify and connect to the network they wish to attack through the use of rogue access points. Conclusion
The five computing disciplines are (Insert the five computing disciplines here). These disciplines are all connected with wireless information technology because (Insert any identifiable connection).
Dekleva, S. , Shim, J. , Varshney, U. , & Knoerzer, G. (2007). Evolution and emerging issues in mobile wireless networks by S , JP, , G. Communications of the ACM (6), 38-43. Nordstrom, M. K. (1999). Known Vulnerabilities in Wireless LAN Security. Retrieved December 10, 2008, from http://www. niksula. hut. fi/~mkomu/docs/wirelesslansec. html Proxim. (1998). What is a Wireless LAN? Proxim.Sample Essay of EduBirdie.com